The Big Shock: 3.5 Billion Users Exposed
Security researchers have uncovered a massive loophole in WhatsApp that put 3.5 billion users at risk. That is virtually everyone who uses the app.
What Actually Happened?
This wasn’t a typical hack where criminals smash through a digital wall to steal passwords. Instead, it was a problem with how the app was built.
- The Weak Spot: The issue was found in the “Contact Sync” feature. This is the tool that normally checks your phone’s address book to tell you which of your friends are also on WhatsApp.
- The “Logic” Flaw: Researchers realized they could abuse this feature. Instead of checking a few friends, they used a computer to ask WhatsApp, “Is this random phone number a user?” millions of times a second.
- The Result: Because of the flaw, WhatsApp was “too polite.” It kept answering “Yes” and handing over the public profile data (like photos and nicknames) for billions of numbers.
How Did They Do It?
The researchers found that WhatsApp’s servers were not properly rate-limiting requests.
The Exploit: They built a script that could query 100 million phone numbers per hour.
The Bypass: By automating these checks, they could “ask” WhatsApp if a phone number existed. If it did, WhatsApp obligingly returned the user’s public data.
The Scale: They successfully enumerated 3.5 billion active accounts across 245 countries.
The Impact: Why Should You Care?
This isn’t just about phone numbers. The data exposed includes:
- Profile Pictures: The researchers scraped public profile photos for 57% of the users (approx. 2 billion people).
- “About” Text: Status messages and bio text.
- Metadata: Timestamps and encryption keys.
Here is the List of country wise

The Nightmare Scenario: Security experts warn this data could be used to create a “Reverse Phone Book” for the entire planet. Malicious actors could potentially use facial recognition on the scraped profile photos to link real-world identities to phone numbers, enabling targeted phishing, stalking, or fraud.
Country-by-Country Breakdown: The researchers have released a detailed census of the affected regions. You can check the full list of countries and the scale of the exposure here: View the WhatsApp Census Country List
Meta Review: The Official Response
Meta (WhatsApp’s parent company) has acknowledged the issue but emphasizes that no private messages were read (due to End-to-End Encryption).
- The Fix: Meta has reportedly patched the vulnerability as of October 2025, implementing stricter rate limits to prevent mass scraping.
- The Stance: A spokesperson stated there is “no evidence” that malicious actors abused this flaw in the wild before it was fixed.
- The Bounty: The researchers were awarded a bug bounty for their responsible disclosure.
What’s Next? (Actionable Advice)
While Meta has plugged the hole, this incident serves as a wake-up call. If your profile photo is set to “Everyone,” it was likely scraped.
Immediate Steps to Protect Yourself:
Lock Down Your Profile: Go to Settings > Privacy > Profile Photo and change it to “My Contacts” or “Nobody”. Do the same for your “About” and “Last Seen” status.
Be wary of unknown calls: With phone numbers exposed, expect a potential rise in spam calls or “Hi mum” scams.
Check 2FA: Ensure Two-Step Verification is enabled to prevent account takeovers (Settings > Account > Two-step verification).
WhatsApp user exposed country wise – here is the full list.